applied cryptography - protocols, algorithms, and source code in c

92110 293 kw campbell and mj wiener des is not a group

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ogy, v. 7, n. 4, 1994, pp. 229–246. 164. E. Biham, “On Matsui’s Linear Cryptanalysis,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, pp. 398–412. 165. E. Biham and A. Biryukov, “How to Strengthen DES Using Existing Hardware,” Advances in Cryptology—ASIACRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 166. E. Biham and P.C. Kocher, “A Known Plaintext Attack on the PKZIP Encryption,” K.U. Leuven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 167. E. Biham and A. Shamir, “Differential Cryptanalysis of DES–like Cryptosystems,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 2–21. 168. E. Biham and A. Shamir, “Differential Cryptanalysis of DES–like Cryptosystems,” Journal of Cryptology, v. 4, n. 1, 1991, pp 3–72. 169. E. Biham and A. Shamir, “Differential Cryptanalysis of Feal and N–Hash,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 1–16. 170. E. Biham and A. Shamir, “Differential Cryptanalysis of Snefru, Khafre, REDOC–II, LOKI, and Lucifer,” Advances in Cryptology—CRYPTO ’91 Proceedings, 1992, pp. 156–171. 171. E. Biham and A. Shamir, “Differential Cryptanalysis of the Full 16–Round DES,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, 1993, 487– 496. 172. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer–Verlag, 1993. 173. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, “Systematic Design of Two–Party Authentication Protocols,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 44–61. 174. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, “Systematic Design of a Family of Attack–Resistant Authentication Protocols,” IEEE Journal of Selected Areas in Communication, to appear. 175. R. Bird, I. Gopal, A. Herzberg, P....
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online